This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
An instant messaging client installed on the remote Windows host is
affected by a buffer overflow vulnerability.
The version of Pidgin installed on the remote host is earlier than
2.10.5. As such, it is potentially affected by a stack-based buffer
An error in the function 'mxit_show_message' in the file
'libpurple/protocols/mxit/markup.c' can allow a stack-based buffer
overflow to occur when parsing a received message containing inline
images. This can result in application crashes and potentially
arbitrary code execution.
See also :
Upgrade to Pidgin 2.10.5 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false